Top 50 CCNA Interview Questions and Answers 2024
Prepare for success in CCNA interviews with our comprehensive guide featuring the top 50 CCNA interview questions and answers 2024.
Q1) What is Network?
🡺 A computer network can be described as a system of interconnected devices that can communicate using some common standards called the Internet protocol suite or TCP/IP. These devices communicate to exchange network resources, such as files and printers, and network services.
Example: The example above shows that the two computers are directly connected using a cable. This small network can exchange data between just these two computers.
Q2) What is Point to Point Connection?
🡺
A point-to-point connection is a direct connection between two nodes. Data transmitted by one node goes directly to the other.
Dial-up modem connections are point-to-point connections
Q3) What is the Gateway-to-Gateway protocol?
🡺
The Gateway-to-Gateway Protocol (GGP) is an obsolete routing protocol used in early versions of the Internet.
It was used to exchange routing information between gateway hosts in different networks to facilitate routing decisions. GGP was designed to work with the older version of the Internet Protocol (IP) known as IPv4.
However, GGP has been largely replaced by more efficient and scalable routing protocols such as Border Gateway Protocol (BGP) and Open Shortest Path First (OSPF) in modern networking environments.
Q4) What is Protocol?
🡺
A protocol is a set of rules and conventions that govern how data is exchanged between devices or systems.
In networking, protocols define the format and sequence of messages exchanged between devices, as well as the actions taken by devices in response to those messages.
Protocols ensure that devices can communicate effectively and understand each other’s messages.
Examples of networking protocols include the Internet Protocol (IP) for routing data across the Internet, the Transmission Control Protocol (TCP) for reliable data transmission, and the Hypertext Transfer Protocol (HTTP) for transmitting web pages over the Internet.
Q5) Explain difference between Router, Switch and Hub? 🡺
Hub | Switch | Router |
Hub is a physical layer device i.e. layer 1. | Switch is a data link layer device i.e. layer 2. | Router is a network layer device i.e. layer 3. |
A Hub works on the basis of broadcasting. | Switch works on the basis of MAC address. | A router works on the basis of IP address. |
A Hub is a multiport repeater in which a signal introduced at the input of any port appears at the output of the all available ports. | A Switch is a tele communication device which receives a message from any device connected to it and then transmits the message only to the device for which the message is intended. | A router reads the header of incoming packet and forward it to the port for which it is intended there by determines the route. It can also perform filtering and encapsulation. |
Hub is not an intelligent device that may include amplifier on repeater. | A Switch is an intelligent device as it passes on the message to the selective device by inspecting the address. | A route is more sophisticated and intelligent device as it can read IP address and direct the packets to another network with specified IP address. Moreover routers can built address tables that helps in routing decisions. |
At least single network is required to connect. | At least single network is required to connect. | Router needs at least two networks to connect. |
Hub is cheaper as compared to switch and router. | Switch is an expensive device than hub. | Router is a relatively much more expensive device than hub and switch. |
Speed of original hub 10Mbps and modern internet hub is 100Mbps. | Maximum speed is 10Mbps to 100Mbps. | Maximum speed for wireless is 1-10 Mbps and maximum speed for wired connections is 100 Mbps. |
Hubs are used in LANs. | Switch is used in LANs. | Routers are used in LANs, MANs and WANs. |
For Free, Demo classes Call: 020-71173071
Registration Link: Click Here!
Q6) What are the criteria necessary for an effective and efficient network?
🡺
The most important criteria are performance, reliability, and security. A) Performance:
– It measures how well a network can support communication between two nodes in the Network or with nodes of other networks in the global scope.
– The two major tasks in a network are the Transmission and Reception of information.
– We need to focus on how fast a message is transmitted and how fast a node can receive a request and find the needed information.
– Hence, to measure the performance of a network, here are the major factors to be considered:
- a) Transit Time: The total time a node takes to transmit a message from the beginning until the last character of the message. Transit stands for
- b) Response Time: The total time a nodes takes to process an inquiry or a request from another node / device and respond. It is the time between the inquiry’s end and the response’s beginning.
- c) Throughput: Throughput measures how much data is transferred successfully from the sender node to the receiver node in a particular time It is measured in bits per second or data per second.
- d) Bandwidth: The max possible throughput capacity of the Network. We can measure it in bits, megabits, or gigabits per second. It defines the highest limit.
- e) Delay / Latency: As, we discussed, Throughput is the number of data packets successfully delivered in a given time. Delay is the measure of time taken to do the delivery.
- B) Reliability:
– It is the degree to which a network is trustworthy, consistent, and dependable.
– The Reliability of a network is measured by the frequency of failures it is undergoing and the time it takes to recover from the failures.
– Overall, the Robustness of the Network at times of catastrophic events is measured to check how reliable the Network is.
Whereas,
Robustness of the Network = The ability to maintain the function and property of the network that the damaged network has it network robustness.
- C) Security:
– It measures how the Network secures the data amid failures and attacks and the policies and procedures it implements to protect itself from damages and un authorized access.
– In Reliability, the frequency of failures is checked.
– In Security, network attacks and data breaches are checked.
Q7) What is the Ipconfig command, and why is it used? 🡺
The IPCONFIG command shows the IP address information for a computer. From the output, we can find the IP address, DNS IP address, and gateway IP address given to the computer.
Q8) Let’s say a virtual machine is suddenly turned off. Which VM log files should be looked at to troubleshoot what’s wrong?
🡺
If something like this happens, an administrator needs to analyze the issue by looking at the log files named vmware.log and hostd.log.
The hostd.log log files explain the agent that maintains and configures the ESXi host and virtual machines.
The Vmare.log log files keep track of the activity on the ESX host and the virtual machines it hosts.
Q9) What common problems with software can cause network problems?
🡺
Several of the following can contribute to network-related problems:
∙ Error in configuration
∙ Application conflicts
∙ Client-server problems
∙ Security issues
∙ Protocol mismatch
∙ User policy and rights issues
Q10) What would you do to troubleshoot what was wrong with an FTP server?
🡺 If you’re having issues with your FTP server, here are the three things you should try:
∙ Ping is a simple tool for checking network connectivity. The “echo request” is a part of ICMP that is used by the “ping” command (Internet Control Message Protocol). To check if a device is online or active, you can use the “ping” command, equivalent to sending an echo request.
∙ Check the available ports with Nmap (20 and 21). You may evaluate your firewall and other security measures with the help of the Nmap-hosted security tool. Ports in modern operating systems are numeric addresses used for networking. As a general rule, various services make use of separate ports. It is essential to know which ports are open and closed to prevent any security breaches resulting from the improper port configuration.
∙ Find out if a firewall is preventing traffic from reaching the server.
Q11) What is the difference between OSI and TCP/IP Model? 🡺
TCP/IP | OSI Model |
The full form of TCP/IP is Transmission Control Protocol/ Internet Protocol. | The full form of OSI is Open Systems Interconnection. |
It is a communication protocol that is based on standard protocols and allows the connection of hosts over a network. | It is a structured model which deals which the functioning of a network. |
In 1982, the TCP/IP model became the standard language of ARPANET. | In 1984, the OSI model was introduced by the International Organisation of Standardization (ISO). |
It comprises of four layers: ∙ Network Interface ∙ Internet ∙ Transport ∙ Application | It comprises seven layers: ∙ Physical ∙ Data Link ∙ Network ∙ Transport ∙ Session |
∙ Presentation ∙ Application | |
It follows a horizontal approach. | It follows a vertical approach. |
The TCP/IP is the implementation of the OSI Model. | An OSI Model is a reference model, based on which a network is created. |
It is protocol dependent. | It is protocol independent. |
Q12) What is meant by 127.0.0.1 and localhost?
🡺The localhost or loopback address is 127.0.0.1. These systems are often only accessible to the largest clients or the Internet’s founding members. Pinging the server to see if it responds is the first step in diagnosing connection problems.
There could be many reasons why the server isn’t responding, such as a malfunctioning network, faulty wiring, or a malfunctioning network card. Pinging 127.0.0.1 indicates that the hardware is functioning properly because it is a loopback connection on the NIC.
With most network operations, 127.0.0.1 and localhost refer to the same thing.
Q13) What are different ways to send data through networks? 🡺
In computer networks, there are three different ways that data can be sent. Here is a list of them,
∙ Simplex: Simplex is one-way data transport. Simplex mode transfers data from sender to receiver or receiver to sender—radio signal, computer-to printer signal, Etc.
∙ Half Duplex: Both directions can transfer data, but not simultaneously. Data is sent and received. In internet browsing, a user submits a request to the server, which then sends back the web page.
∙ Full Duplex: Simultaneous bidirectional data transfer. Two-way highways, phone calls, Etc.
For Free, Demo classes Call: 020-71173071
Registration Link: Click Here!
Q14) What’s the difference between FTP and TFTP application layer protocols?
🡺
∙ The simple file transfer protocol (TFTP) describes a local host retrieving data from a remote host.
∙ It takes advantage of the standard packet delivery features of UDP. However, it is unreliable and lacks security.
∙ TCP/IP often provides the File Transfer Protocol to transfer data between hosts (FTP). Because it takes advantage of TCP’s facilities, it is dependable and safe.
∙ Two connections are established between the hosts: one for command and control information and another for actual data transfer.
Q15) When were OSI model developed and why it’s standard called 802.XX and so on?
🡺
∙ The OSI (Open Systems Interconnection) model was developed by the International Organization for Standardization (ISO).
∙ It was first introduced in 1984 as a conceptual framework to standardize and organize the functions of a telecommunication or computing system into seven distinct layers.
∙ The goal was to facilitate communication and interoperability between different systems and technologies.
∙ The term “802.XX” refers to a series of IEEE (Institute of Electrical and Electronics Engineers) standards related to networking.
∙ The numbers following “802” correspond to specific working groups within the IEEE that focus on various aspects of networking.
∙ The IEEE 802 standards cover a wide range of protocols and technologies, including Ethernet (802.3), Wi-Fi (802.11), and many others.
∙ The naming convention “802” is simply a reference to the project number assigned to the working group within the IEEE that develops and maintains these standards.
∙ It doesn’t directly correlate with the OSI model; instead, it’s a separate set of standards that address various aspects of network communication and connectivity.
Q16)What is the difference between tracert and traceroute? 🡺
tracert and traceroute are commands used to trace the route that packets take to reach a destination on a network.
The main difference between them lies in the operating systems and platforms where they are commonly used:
1) Tracert:
Platform: Tracert is a command-line utility used in Windows operating systems.
Syntax: In Windows, you use the tracert command followed by the destination IP address or domain name.
Example: tracert www.example.com
2) Traceroute:
Platform: Traceroute is the equivalent command used in Unix-like operating systems, including Linux and macOS.
Syntax: In Unix-like systems, you use the traceroute command followed by the destination IP address or domain name.
Example: traceroute www.example.com
Q17) IEEE standard for wireless networking?
🡺
The IEEE standard for wireless networking is defined under the IEEE 802 family of standards. Several standards within this family address various aspects of wireless networking, including different types of wireless technologies. Some of the prominent IEEE 802 standards for wireless networking include:
1) IEEE 802.11: This standard defines the specifications for Wireless Local Area Networking (WLAN) commonly known as Wi-Fi. It includes various amendments and updates, such as 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ax (Wi-Fi 6).
2) IEEE 802.15: This family of standards focuses on Wireless Personal Area Networks (WPANs). One notable standard is IEEE 802.15.1, which is the basis for Bluetooth technology.
3) IEEE 802.16: This standard is known as WiMAX (Worldwide Interoperability for Microwave Access) and is designed for broadband wireless access over longer distances. It includes specifications for both fixed and mobile broadband wireless systems.
4) IEEE 802.22: This standard is designed for Wireless Regional Area Networks (WRANs) and utilizes cognitive radio technology to operate in unused TV spectrum.
Q18) What is 100BaseFX?
🡺
100BaseFX refers to one of the Ethernet standards defined by the IEEE 802.3u committee for Fast Ethernet over optical fiber.
The “100” in 100BaseFX denotes a data rate of 100 megabits per second (Mbps), and “FX” indicates that it uses a fiber optic medium.
Fast Ethernet represents an improvement over traditional Ethernet, which operates at 10 Mbps.
Key features of 100BaseFX:
∙ Data Rate: It supports a data rate of 100 Mbps, providing a tenfold increase in speed compared to traditional Ethernet.
∙ Medium: 100BaseFX operates over optical fiber, which offers advantages such as greater bandwidth, immunity to electromagnetic interference, and the ability to transmit data over longer distances compared to copper cabling.
∙ Topology: It can be used in various network topologies, including point-to point links and multi-mode or single-mode fiber optic cables.
∙ Standards: 100BaseFX is part of the IEEE 802.3u standard, which defines Fast Ethernet. Specifically, the standard for 100BaseFX is IEEE 802.3u-1995. ∙ Connectors: It typically uses fiber optic connectors such as SC (Subscriber Connector) or ST (Straight Tip).
100BaseFX provides a cost-effective solution for upgrading network speeds in environments where the installation of new copper cabling may be impractical or where the advantages of fiber optics are desired.
It played a significant role in the transition from traditional Ethernet to Fast Ethernet in the evolution of networking technologies.
Q19) Which layer provides logical addressing that routers will use for path determination?
🡺
The Layer 3, or Network Layer, is responsible for finding the right path for the data packet to reach its destination based on Logical Addresses (means addresses not really present on the network node).
Q20) Which layer specifies voltage, wire speed, and pinout cables and moves bits between devices?
🡺 Physical Layer
Q21) Which layer combines bits into bytes and bytes into frames, uses MAC addressing, and provide error detection?
🡺 The Data Link Layer combines bits into bytes and bytes into frames and uses MAC addressing. The Data Link Layer is the second layer of the OSI model and is responsible for providing reliable and error-free communication over a physical link.
Q22) Which layer is responsible for keeping the data from different applications separate on the network?
🡺 Session Layer
Q23) Which layer provides the physical transmission sof the data and handless error notification, network topology, and flow control?
🡺 The Data Link layer (also called Layer 2) provides the physical transmission of the data and handles error notification, network topology, and flow control.
Q24) Which layer is responsible for converting data packets from the Data Link layer into electrical signals?
🡺
The Physical layer takes frames from the Data Link layer and encodes the 1s and 0s into a digital signal for transmission on the network medium.
Q25) Utilizing RIP, what is the limit when it comes to number of hops?
🡺
∙ In RIP version 1, the maximum allowable hop count is 15. This means that a route will be considered unreachable if the number of hops exceeds 15. A hop count represents the number of routers a packet must traverse to reach its destination.
∙ In RIP version 2, the maximum hop count is also 15 by default. However, RIP version 2 introduces support for a feature called “infinite” or “unreachable” metric. Instead of relying solely on the hop count, RIP version 2 allows routes to be marked as unreachable by setting their metric to a special value, effectively indicating that the route is unreachable. This provides a more flexible mechanism for expressing unreachable routes.
Q26) How do you stop RIP updates from propagating out an interface on a router?
🡺
In RIP (Routing Information Protocol), you can control the propagation of updates out of a specific interface using the “passive-interface” command.
This command prevents RIP updates from being sent or received on a particular interface without affecting the overall operation of RIP on other interfaces.
Here’s how you can use the “passive-interface” command:
Command: Router(config)# router rip
Command: Router(config-router)# passive-interface [interface_type interface_number]
Router rip: Enters the RIP configuration mode.
passive-interface [interface_type interface_number]: Marks the specified interface as passive, preventing RIP updates from being sent or received on that interface.
Example:
Router(config)# router rip
Router(config-router)# passive-interface GigabitEthernet0/0
Note: In this example, RIP updates will not be sent or received on the GigabitEthernet0/0 interface.
You would replace “GigabitEthernet0/0” with the actual interface you want to make passive.
Q27) Does EIGRP require an ip default-network command to propagate a default route?
🡺
No, EIGRP does not require the “ip default-network” command to propagate a default route. EIGRP can propagate a default route using either a static route or by redistributing a static route into EIGRP.
To propagate a default route in EIGRP, you can use the following methods:
Redistribution: If the default route is present in the routing table as a static route, you can redistribute it into EIGRP using the redistribute static command under the EIGRP process.
Command: router eigrp <AS-number>
redistribute static
Summary Routes: You can advertise a summary route that covers all possible default routes. This is done using the ip summary-address command under the EIGRP interface configuration.
Command: interface <interface>
ip summary-address eigrp <AS-number> 0.0.0.0 0.0.0.0
The ip default-network command is used with other routing protocols like RIP and IGRP to advertise a default route. In EIGRP, you typically use the methods mentioned above to propagate a default route.
Q28) Does EIGRP require an ip default-network command to propagate a default route?
🡺
Yes, this command makes it easy to determine why an EIGRP neighbour was reset Q29) What is Advertised distance?
🡺
In EIGRP (Enhanced Interior Gateway Routing Protocol), the Advertised Distance (AD) is the total metric of a route as advertised by a neighboring router. It represents the cost to reach a destination network as advertised by the neighbor.
When a router receives an EIGRP update from a neighbor, it includes the AD in the update packet. The receiving router uses this information to calculate its feasible distance (FD) to the destination network, which is the sum of the AD and the cost to reach the neighbor advertising the route.
The AD is used in the DUAL (Diffusing Update Algorithm) to determine the best path to a destination network. Each router maintains a topology table containing information about all known routes, including the AD and the FD. By comparing the FD of its neighbors with its own FD to the same destination, a router can determine if the neighbor’s path is a better route to reach the destination network.
For Free, Demo classes Call: 020-71173071
Registration Link: CCNA Training in Pune!
Q30) What is successor?
🡺
In EIGRP (Enhanced Interior Gateway Routing Protocol), a successor is the best path to reach a destination network. It is the route with the lowest feasible distance (FD) among all known routes to that destination.
When a router receives EIGRP updates from its neighbours, it calculates the FD for each route based on the advertised distance (AD) received from the neighbour and the cost to reach that neighbour. The route with the lowest FD is chosen as the successor route.
The successor route is used to forward traffic to the destination network. EIGRP also maintains backup routes, known as feasible successors, which are routes that have a higher FD than the successor but are still considered loop-free backup paths. If the successor route fails, one of the feasible successors can be used as the new successor without causing a routing loop.
Q31) If there are two EIGRP processes that run and two equal paths are learned, one by each EIGRP process, do both routes get installed? 🡺
Yes, if there are two EIGRP processes running on a router and each process learns an equal-cost path to a destination network, both routes will be installed in the routing table.
Each EIGRP process maintains its own topology table and calculates its own best paths independently.
If both processes determine that a path is the best path to a destination, both routes will be installed in the routing table and the router will load-balance traffic between them.
Q32) What is the difference in metric calculation between EIGRP and IGRP?
🡺
Characteristics | IGRP | EIGRP |
Convergence time | Slow | Fast |
Administrative distance | 100 | Internal: 90; External: 170 |
Maximum hop count | 100 | 224 |
Route summarization | Classful | Classless |
Support for VLSM and CIDR | No | Yes |
Supports multiple network layer protocols | No | Yes |
Triggered updates | No | Yes |
Neighbour discovery and maintenance | Broadcast-based | Multicast-based |
Scalability | Limited | High |
Compatibility with Cisco devices | Yes | Yes |
Full Form | Interior Gateway Routing Technology (IGRP) | Enhanced Interior Gateway Routing Protocol (EIGRP) |
Q33) Which command in OSPF shows the network LSA information? 🡺
In OSPF (Open Shortest Path First), the command to display network LSA (Link State Advertisement) information is show ip ospf database network.
This command displays information about network LSAs in the OSPF database, including the router ID of the advertising router, the network mask, and the list of routers connected to the network.
Q34) What is the main importance of STUB network? Why it is been developed in OSPF?
🡺
A stub network in OSPF (Open Shortest Path First) is a network that has only one exit point, typically towards a single router or a single point of connection to the
OSPF domain. The main importance of stub networks in OSPF is to reduce the size of the OSPF routing table and to simplify routing in certain network topologies.
Here are some key reasons why stub networks were developed in OSPF:
- a) Reduced Routing Table Size: By designating a network as a stub network, OSPF routers in the network do not need to store detailed routing information for external networks beyond the stub area. Instead, they only need to know the route to the exit point of the stub network, reducing the size of the routing table.
- b) Reduced OSPF Traffic: OSPF routers in a stub network do not participate in OSPF routing updates beyond the stub area. This reduces OSPF control traffic and processing overhead on routers within the stub network.
- c) Simplified Configuration: Configuring a network as a stub network simplifies OSPF configuration, as routers in the stub network only need to be configured with basic OSPF settings and do not require complex routing policies or filtering.
- d) Increased Stability: By limiting the scope of OSPF routing updates within the stub network, changes in external networks are less likely to affect the stability of the stub network.
Overall, stub networks in OSPF are a mechanism to optimize routing in certain network scenarios, providing a balance between routing efficiency and network complexity.
Q35) If router ID are same between OSPF enabled routers will they form adjacency or not?
🡺
If OSPF-enabled routers have the same router ID, they will not form an adjacency. The router ID in OSPF is a unique identifier for each router in the OSPF domain. When routers attempt to form an OSPF adjacency, they exchange Hello packets containing their router IDs.
If two routers have the same router ID, they will consider each other as the same router and will not form an adjacency, as OSPF requires each router to have a unique router ID within the OSPF domain.
Q36) What is LSA in case of OSPF? It resemblance to which properties of EIGRP?
🡺
LSA (Link State Advertisement) in OSPF (Open Shortest Path First) is a type of packet used by OSPF routers to exchange information about the network topology.
LSAs contain information about routers, links, and network segments in an OSPF domain.
OSPF routers use LSAs to build and maintain a map of the entire OSPF domain, which is used to calculate the shortest path to each destination network.
LSAs in OSPF resemble the topology table in EIGRP (Enhanced Interior Gateway Routing Protocol).
Both OSPF LSAs and EIGRP’s topology table contain information about the network topology and are used by routers to make routing decisions. However, there are differences in how they are implemented and the specific information they contain.
OSPF LSAs are more standardized and contain specific types of information about routers and links in the OSPF domain, while EIGRP’s topology table is more flexible and can contain additional information based on EIGRP’s metric calculation and route selection process.
Q37) What are the states used in OSPF when forming neighbours ip? 🡺
In OSPF (Open Shortest Path First), when routers are forming neighbours and establishing OSPF adjacencies, they go through several states.
These states are part of the OSPF neighbour relationship process and are as follows:
- a) Down: This is the initial state of an OSPF neighbour relationship. In this state, the router has not yet received any OSPF Hello packets from the potential neighbour.
- b) Init: In this state, a router has received an OSPF Hello packet from a potential neighbour, but the router’s own Router ID was not included in the Hello packet’s neighbour list.
- c) Two-Way: In this state, the router has received an OSPF Hello packet from a potential neighbour, and the router’s own Router ID was included in the Hello packet’s neighbour list. At this point, bidirectional communication between the two routers is established.
- d) Exstart: In this state, routers are determining which router will be the master in establishing the adjacency. They exchange their initial database descriptions (DBDs) to synchronize their databases.
- e) Exchange: In this state, routers exchange database description packets (DBDs) to describe their link-state databases. They request and send link state advertisements (LSAs) that are missing in their databases.
- f) Loading: In this state, routers request and receive missing link-state advertisements (LSAs) from each other. They are in the process of updating their link-state databases.
- g) Full: This is the final state of the OSPF neighbour relationship process. In this state, routers have fully synchronized their link-state databases, and the OSPF adjacency is fully established. Routers in this state can exchange routing updates and forward traffic based on the OSPF topology.
Q38) How does STP maintain a loop-free network?
🡺
STP (Spanning Tree Protocol) maintains a loop-free network by ensuring that only one active path exists between any two network devices.
It accomplishes this by electing a root bridge and calculating the shortest path to the root bridge for each network segment.
Here’s how STP maintains a loop-free network:
- a) Root Bridge Election: STP elects a root bridge for the network based on the bridge ID, which consists of a priority value and a MAC address. The bridge with the lowest bridge ID becomes the root bridge. All other bridges in the network determine their shortest path to the root bridge.
- b) Designated and Non-Designated Ports: After the root bridge is elected, each network segment (or LAN segment) selects a designated port. The designated port is the port on the switch that offers the shortest path to the root bridge for that segment. All other ports on the segment are in a blocking state, preventing loops.
- c) Blocking Ports: STP uses a blocking state on ports that are not designated Blocking ports do not forward traffic but are kept in a listening state to detect if the designated port fails. If the designated port fails, the blocking port can transition to a forwarding state to maintain connectivity.
- d) Path Cost Calculation: STP calculates the path cost for each port based on the speed of the link. Higher-speed links have lower path costs, so STP prefers these paths over lower-speed links.
- e) Loop Prevention: By using the root bridge election, designated ports, and blocking ports, STP ensures that there is only one active path between any two devices in the network. This prevents loops from forming and ensures
that traffic can flow without causing broadcast storms or other network issues.
Q39) What is BDPU? What is the basics function of BPDU?
🡺
BPDU (Bridge Protocol Data Unit) is a message format used by the Spanning Tree Protocol (STP) and its variants (RSTP, MSTP) to exchange information between switches in a network to detect loops and create a loop-free topology.
The basic function of BPDU is to allow switches to communicate with each other and exchange information about the network topology.
- a) Electing the Root Bridge: BPDUs contain information about the sending switch, including its bridge ID and the path cost to the root bridge. Switches use this information to elect the root bridge for the network.
- b) Calculating the Shortest Path to the Root Bridge: BPDUs also contain information about the sending switch’s best path to the root bridge. Switches use this information to determine the shortest path to the root bridge for each network segment.
- c) Detecting Loops: BPDUs are used to detect loops in the network. When a switch receives a BPDU on a port, it checks the BPDU information to determine if the receiving port should be blocked to prevent a loop.
- d) Notifying of Topology Changes: BPDUs can also be used to notify switches of changes in the network topology, such as link failures or topology When a switch detects a change, it sends out BPDUs to inform other switches of the change.
Q40) Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP)?
🡺
STP | RSTP |
Its IEEE standard is 802.1D. | Its IEEE standard is 802.1W. |
In STP only the root bridge sends BPDU (Bridge protocol data unit) and it is transferred by others. | In RSTP all bridges can forward BPDUs. |
STP has three port roles (i.e., Root Port, Designated Port, and Blocked Port). | RSTP has four-port roles (i.e., Root Port, Designated Port, Alternate Port, and Backup Port). |
STP has five port states (i.e., Forwarding, Learning, Listening, Blocking, and Disabled). | RSTP has three port states (i.e., Forwarding, Learning, and Discarding). |
It doesn’t have any link type. | It has Two link types i.e., Shared link and Point to point link. |
STP provides slower network convergence in response. | RSTP provides significantly faster network convergence. |
Q41) How do non root bridge decide which port will elect as root port? 🡺
In a Spanning Tree Protocol (STP) network, non-root bridges determine which port will be the root port based on the following criteria:
- a) Path Cost: The path cost is calculated based on the speed of the link. Lower-speed links have higher path costs. The port with the lowest path cost to the root bridge is selected as the root port.
- b) Bridge ID of Neighbour Switches: If there are multiple paths with the same path cost, the bridge ID of the neighbour switches is used to break the tie. The switch with the lower bridge ID is preferred, and its corresponding port is selected as the root port.
- c) Priority and MAC Address: If the bridge ID tiebreaker is not enough to select a root port, the switch’s own priority and MAC address are used as additional tiebreakers. The switch with the lower priority or MAC address is
- d) Port ID: If all other factors are equal, the port ID (port number) is used as the final tiebreaker. The port with the lower port ID is selected as the root
By using these criteria, non-root bridges in an STP network can determine the best path to the root bridge and select the root port accordingly. This helps to create a loop-free topology and ensures that traffic is forwarded along the most efficient path in the network.
Q42) How many designated ports can be available on a root bridge? 🡺
On a root bridge in a Spanning Tree Protocol (STP) network, all ports are designated ports.
This means that there can be multiple designated ports on a root bridge, one for each segment connected to the root bridge.
A designated port is the port on a segment that offers the shortest path to the root bridge for that segment.
Since the root bridge is the central point in the STP topology and all other switches in the network are trying to reach it, all ports on the root bridge will be designated ports.
This allows traffic to flow efficiently through the network, with each segment having a single designated port to reach the root bridge.
Q43) How many root bridges can be available on a STP configured network? 🡺
In a Spanning Tree Protocol (STP) configured network, there can be only one Root Bridge.
The root bridge is the central bridge in the STP topology and is responsible for providing a reference point for all other bridges in the network.
All other bridges in the network are either directly or indirectly connected to the root bridge.
The root bridge is elected based on the bridge ID, which consists of a priority value and a MAC address.
The bridge with the lowest bridge ID becomes the root bridge.
If multiple bridges have the same priority, the bridge with the lowest MAC address is selected as the root bridge.
Having only one Root Bridge ensures that there is a single point of reference for the STP topology, which helps prevent loops and ensures that traffic flows efficiently through the network.
Q44) Which switching technology reduces the size of a broadcast domain? 🡺
VLANs (Virtual Local Area Networks) are a switching technology that reduces the size of a broadcast domain. VLANs allow you to segment a single physical network into multiple logical networks, each with its own broadcast domain. By separating devices into different VLANs, you can control the broadcast traffic within each VLAN, which helps reduce the overall size of the broadcast domain and improves network performance.
Q45) Which protocols are used to configure trunking on a switch? 🡺
The protocols used to configure trunking on a switch are:
IEEE 802.1Q: This is the industry-standard protocol for trunking. It adds a 4-byte tag to Ethernet frames, indicating the VLAN to which the frame belongs.
Cisco Inter-Switch Link (ISL): This is a proprietary protocol developed by Cisco before 802.1Q became the standard. ISL encapsulates the entire Ethernet frame with a header and trailer, adding VLAN information
Both protocols allow switches to carry traffic from multiple VLANs over a single link, known as a trunk. However, 802.1Q is more commonly used today due to its standardization and compatibility with non-Cisco devices.
Q46) What is meant by “router on stick”?
🡺
“Router on a stick” is a network configuration where a single physical router interface is used to route traffic between multiple VLANs (Virtual Local Area Networks). In this configuration, the router interfaces are configured as trunk ports, allowing them to carry traffic for multiple VLANs over a single physical link.
The term “router on a stick” comes from the idea that the single physical link resembles a stick, with the router acting as the “router” that routes traffic between VLANs.
To implement router on a stick, the router interface connected to the switch is configured with sub interfaces, each corresponding to a different VLAN. Each sub interface is assigned an IP address in the respective VLAN’s subnet, and the router uses 802.1Q trunking to tag traffic from each VLAN as it travels over the single physical link. This allows the router to differentiate and route traffic between VLANs.
Q47) Which are the two trunking protocols?
🡺
The two trunking protocols commonly used in networking are:
- IEEE 802.1Q: This is the industry-standard trunking protocol used to carry VLAN information on Ethernet networks. It adds a 4-byte VLAN tag to the Ethernet frame, allowing switches to identify which VLAN the frame belongs to.
- Cisco Inter-Switch Link (ISL): This is a proprietary trunking protocol developed by Cisco. ISL encapsulates the entire Ethernet frame with a header and trailer, adding VLAN information. However, ISL is less commonly used today as 802.1Q has become the industry standard.
Q48) How does a switch forward traffic from a trunk port to appropriate VLAN?
🡺
When a switch receives traffic on a trunk port, it uses the VLAN tag in the Ethernet frame’s header to determine which VLAN the traffic belongs to.
Here’s how a switch forwards traffic from a trunk port to the appropriate VLAN:
- a) Receive Frame: The switch receives an Ethernet frame on a trunk port. The frame includes a VLAN tag, which indicates the VLAN to which the frame
- b) Check VLAN Tag: The switch checks the VLAN tag in the frame’s header to determine the VLAN ID.
- c) Look up VLAN Membership: The switch looks up the VLAN ID in its VLAN database to determine which ports are members of that VLAN.
- d) Forward Traffic: If the frame is destined for a device within the same VLAN, the switch forwards the frame out the appropriate access port for that If the frame is destined for a device in another VLAN, the switch forwards the frame out the trunk port with the appropriate VLAN tag.
Q49) What are different Vlan modes?
🡺
In Cisco switches, there are several VLAN modes that determine how a port behaves in relation to VLANs. The main VLAN modes are:
- a) Access Mode: This mode is used for connecting devices that are not VLAN aware. Traffic received on an access port is untagged, and the switch forwards it to the VLAN configured on the port. The switch discards any incoming frames with VLAN tags.
- b) Trunk Mode: Trunk mode is used for interconnecting switches or connecting to VLAN-aware devices. Traffic on a trunk port is tagged with the VLAN ID, allowing multiple VLANs to be carried over the same physical
- c) Dynamic Auto Mode: In this mode, the port is willing to form a trunk if the neighboring switch is set to trunk or dynamic desirable mode. If the neighboring switch is set to access or dynamic auto mode, the port becomes an access port.
- d) Dynamic Desirable Mode: In this mode, the port actively tries to form a trunk with the neighboring switch. If the neighboring switch is set to trunk, dynamic auto, or dynamic desirable mode, a trunk will be formed. If the neighboring switch is set to access mode, the port becomes an access port.
- e) Nonegotiate Mode: This mode disables DTP (Dynamic Trunking Protocol) negotiation on the port, forcing it to become a trunk port if the neighboring switch is set to trunk or dynamic desirable mode.
- f) Default Mode: The default mode for Ethernet ports on Cisco switches is dynamic auto, while the default mode for Fast Ethernet and Gigabit Ethernet ports is dynamic desirable.
Q50) What are the requirements to exchange VTP messages between two switches?
🡺
To exchange VTP (VLAN Trunking Protocol) messages between two switches, the following requirements must be met:
- a) VTP Domain Name: Both switches must be configured with the same VTP domain name. The VTP domain name is a case-sensitive alphanumeric string that identifies the VTP domain to which the switch belongs.
- b) VTP Mode: At least one of the switches must be in VTP server or transparent mode. The VTP server is responsible for managing VLAN information and propagating it to other switches in the same VTP domain. The other switch can be in server, client, or transparent mode.
- c) VTP Version: Both switches must be using the same version of VTP (either VTP version 1 or VTP version 2). VTP version 2 introduces enhancements over version 1, such as support for Token Ring VLANs and better handling of VLAN pruning.
- d) Trunk Link: The switches must be connected by a trunk link that allows VLAN traffic to pass between them. The trunk link should be configured to allow the necessary VLANs to pass.
- e) Configuration Revision Number: The switch with the higher configuration revision number will overwrite the VLAN configuration on the switch with the lower revision number. Therefore, it’s important to ensure that the configuration revision numbers are synchronized between switches.
- f) VTP Password (Optional): If a VTP password has been configured on the switches, it must be the same on both switches. The VTP password is used to authenticate VTP messages exchanged between switches.
To explore more do visit: Click Here
Author:-
Gandhar Bodas
Call the Trainer and Book your free demo Class For Linux Call now!!!
| SevenMentor Pvt Ltd.
© Copyright 2021 | SevenMentor Pvt Ltd.